Edward Felten
#4,564
Most Influential Person Now
Professor of computer science and public affairs
Edward Felten's AcademicInfluence.com Rankings
Edward Feltencomputer-science Degrees
Computer Science
#633
World Rank
#653
Historical Rank
#341
USA Rank
Database
#1033
World Rank
#1087
Historical Rank
#300
USA Rank
Download Badge
Computer Science
Edward Felten's Degrees
- PhD Computer Science University of Washington
- Bachelors Physics California Institute of Technology
Similar Degrees You Can Earn
Why Is Edward Felten Influential?
(Suggest an Edit or Addition)According to Wikipedia, Edward William Felten is the Robert E. Kahn Professor of Computer Science and Public Affairs at Princeton University, where he was also the director of the Center for Information Technology Policy from 2007 to 2015 and from 2017 to 2019. On November 4, 2010, he was named Chief Technologist for the Federal Trade Commission, a position he officially assumed January 3, 2011. On May 11, 2015, he was named the Deputy U.S. Chief Technology Officer. In 2018, he was nominated to and began a term as Board Member of PCLOB.
Edward Felten's Published Works
Published Works
- Lest we remember: cold-boot attacks on encryption keys (2008) (1353)
- SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies (2015) (1053)
- Bitcoin and Cryptocurrency Technologies - A Comprehensive Introduction (2016) (866)
- The Economics of Bitcoin Mining, or Bitcoin in the Presence of Adversaries (2013) (563)
- Password management strategies for online accounts (2006) (412)
- Mixcoin: Anonymity for Bitcoin with Accountable Mixes (2014) (395)
- Large-Step Markov Chains for the Traveling Salesman Problem (1991) (377)
- A study of integrated prefetching and caching strategies (1995) (368)
- Java security: from HotJava to Netscape and beyond (1996) (352)
- Timing attacks on Web privacy (2000) (333)
- "You Might Also Like:" Privacy Risks of Collaborative Filtering (2011) (321)
- Proof-carrying authentication (1999) (297)
- SPORC: Group Collaboration using Untrusted Cloud Resources (2010) (288)
- Extensible security architectures for Java (1997) (281)
- Retrospective: virtual memory mapped network interface for the SHRIMP multicomputer (1994) (266)
- Implementation and performance of integrated application-controlled file caching, prefetching, and disk scheduling (1996) (255)
- A convenient method for securely managing passwords (2005) (239)
- Large-step markov chains for the TSP incorporating local search heuristics (1992) (234)
- CONIKS: Bringing Key Transparency to End Users (2015) (220)
- Bitcoin and Cryptocurrency Technologies (215)
- Security Analysis of the Diebold AccuVote-TS Voting Machine (2007) (205)
- Government Data and the Invisible Hand (2009) (203)
- Cookies That Give You Away: The Surveillance Implications of Web Tracking (2015) (201)
- Web Spoofing: An Internet Con Game (1997) (198)
- New client puzzle outsourcing techniques for DoS resistance (2004) (192)
- Understanding Java stack inspection (1998) (191)
- Arbitrum: Scalable, private smart contracts (2018) (178)
- Securing Java: getting down to business with mobile code (1999) (169)
- Informed consent in the Mozilla browser: implementing value-sensitive design (2002) (152)
- Users' conceptions of web security: a comparative study (2002) (149)
- Application-Controlled File Caching Policies (1994) (147)
- Virtual memory mapped network interface for the SHRIMP multicomputer (1994) (144)
- Implementation and performance of application-controlled file caching (1994) (144)
- A trace-driven comparison of algorithms for parallel prefetching and caching (1996) (144)
- Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs (2010) (143)
- Improving release-consistent shared virtual memory using automatic update (1996) (139)
- SAFKASI: a security mechanism for language-based systems (2000) (130)
- Cookies and Web browser design: toward realizing informed consent online (2001) (129)
- Secrecy, flagging, and paranoia: adoption criteria in encrypted email (2006) (123)
- Attacking an Obfuscated Cipher by Injecting Faults (2002) (106)
- A General and Flexible Access-Control System for the Web (2002) (105)
- Can DREs Provide Long-Lasting Security? The Case of Return-Oriented Programming and the AVC Advantage (2009) (105)
- Cross-Site Request Forgeries : Exploitation and Prevention (2008) (104)
- Fingerprinting Blank Paper Using Commodity Scanners (2009) (100)
- Reading Between the Lines: Lessons from the SDMI Challenge (2001) (99)
- Virtual-Memory-Mapped Network Interfaces (1995) (98)
- Java security: hostile applets, holes&antidotes (1997) (94)
- A skeptical view of DRM and fair use (2003) (92)
- Virtual memory mapped network interface for the SHRIMP multicomputer (1998) (89)
- Hand-Held Computers Can Be Better Smart Cards (1999) (84)
- Software support for virtual memory-mapped communication (1996) (80)
- A Method to Link Advances in Artificial Intelligence to Occupational Abilities (2018) (79)
- Java security - hostile applets, holes and antidotes: what every netscape and internet explorer user needs to know (1997) (78)
- Protected, user-level DMA for the SHRIMP network interface (1996) (78)
- Understanding Trusted Computing: Will Its Benefits Outweigh Its Drawbacks? (2003) (76)
- Social Networking with Frientegrity: Privacy and Integrity with an Untrusted Provider (2012) (71)
- No silver bullet: De-identification still doesn't work (2014) (70)
- Performance issues in non-blocking synchronization on shared-memory multiprocessors (1992) (69)
- Early Experience with Message-Passing on the SHRIMP Multicomputer (1996) (67)
- Java security: Web browsers and beyond (1997) (59)
- A new approach to mobile code security (1999) (57)
- Improving the performance of message-passing applications by multithreading (1992) (56)
- A Precautionary Approach to Big Data Privacy (2016) (55)
- Design choices in the SHRIMP system: an empirical study (1998) (53)
- Users' conceptions of risks and harms on the web: a comparative study (2002) (52)
- Watching You Watch: The Tracking Ecosystem of Over-the-Top TV Streaming Devices (2019) (50)
- Lessons from the Sony CD DRM Episode (2006) (49)
- Receiver anonymity via incomparable public keys (2003) (46)
- Statically Scanning Java Code: Finding Security Vulnerabilities (2000) (45)
- Nuts and Bolts of Network Neutrality (2006) (45)
- Archipelago: an Island-based file system for highly available and scalable internet services (2000) (42)
- Why buy when you can rent ? Bribery attacks on Bitcoin consensus (2015) (41)
- The Traveling Salesman Problem on a Hypercubic, MIMD Computer (1985) (40)
- Integrated parallel prefetching and caching (1996) (40)
- On Decentralizing Prediction Markets and Order Books (2014) (38)
- Protocol compilation: high-performance communication for parallel programs (1993) (38)
- A distributed reputation approach to cooperative Internet routing protection (2005) (38)
- Digital rights management, spyware, and security (2006) (37)
- Chess on a hypercube (1988) (36)
- Securing Bitcoin wallets via threshold signatures (2014) (33)
- Analysis of attacks on SDMI audio watermarks (2001) (33)
- Privacy management for portable recording devices (2004) (33)
- Mechanisms for secure modular programming in Java (2003) (31)
- Performance measurements for multithreaded programs (1998) (30)
- Benchmarking Advanced Architecture Computers (1990) (29)
- A Highly Parallel Chess Program (1988) (29)
- The Occupational Impact of Artificial Intelligence: Labor, Skills, and Polarization (2019) (29)
- Occupational, industry, and geographic exposure to artificial intelligence: A novel dataset and its potential uses (2021) (28)
- Fast RPC on the SHRIMP Virtual Memory Mapped Network Interface (1997) (26)
- Coherent parallel C (1988) (26)
- Anonymity for Bitcoin with accountable mixes ( Full version ) (2014) (22)
- Best-first branch-and bound on a hypercube (1989) (20)
- CONIKS: A Privacy-Preserving Consistent Key Service for Secure End-to-End Communication (2014) (20)
- Design and implementation of NX message passing using Shrimp virtual memory mapped communication (1996) (20)
- Two virtual memory mapped network interface designs (1994) (19)
- Stream Sockets on SHRIMP (1997) (18)
- Models for Security Policies in Proof-Carrying Code (18)
- A Proof-Carrying Authorization System (2001) (17)
- perspectives on Bitcoin and second-generation cryptocurrencies (2015) (17)
- Cookies that give you away : Evaluating the surveillance implications of web tracking ( Draft : April 2 , 2014 ) (2016) (16)
- Simplifying Distributed File Systems Using a Shared Logical Disk (1996) (15)
- In Defense of Pseudorandom Sample Selection (2008) (15)
- Access control for ad-hoc collaboration (2001) (15)
- Client-server computing on Shrimp (1997) (14)
- Access control on the Web using proof-carrying authorization (2003) (14)
- Privacy concerns of implicit secondary factors for web authentication (2014) (13)
- The Variable Impact of Artificial Intelligence on Labor: The Role of Complementary Skills and Technologies (2019) (12)
- Reducing waiting costs in user-level communication (1997) (12)
- DRM and public policy (2005) (11)
- Mobile Code and Security (1998) (10)
- The Effect of Artificial Intelligence on Human Labor: An Ability-Based Approach (2019) (10)
- The era of infinite storage. (2010) (10)
- Computer Security: Competing Concepts (2001) (10)
- A model for Bitcoin’s security and the declining block subsidy (9)
- Performance issues of a distributed frame buffer on a multicomputer (1998) (9)
- Determining an optimal threshold on the online reserves of a bitcoin exchange (2018) (9)
- Synchronization for a multi-port frame buffer on a mesh-connected multicomputer (1995) (9)
- Bubble Trouble: Off-Line De-Anonymization of Bubble Forms (2011) (9)
- A Java Filter (1997) (8)
- Evaluating multi-port frame buffer designs for a mesh-connected multicomputer (1995) (8)
- Privacy and integrity in the untrusted cloud (2012) (7)
- Linking Advances in Artificial Intelligence to Skills , Occupations , and Industries (2017) (7)
- Users' conceptions of web security (2002) (7)
- Webware security (1997) (6)
- Technological access control interferes with noninfringing scholarship. (2000) (6)
- Bringing Deployable Key Transparency to End Users (2015) (6)
- Breaking assumptions: distinguishing between seemingly identical items using cheap sensors (2012) (6)
- A Cryptographic Escrow for Treaty Declarations and Step-by-Step Verification (2018) (5)
- Privacy and Integrity are Possible in the Untrusted Cloud (2012) (5)
- Client-Server Computing on the SHRIMP Multicomputer (2001) (5)
- Generalized signals: an interrupt-based communication system for hypercubes (1988) (4)
- Watching the watchers: bias and vulnerability in remote proctoring software (2022) (4)
- How will Language Modelers like ChatGPT Affect Occupations and Industries? (2023) (4)
- Contention and Queueing in an Experimental Multicomputer: Analytical and Simulation-based Results (1996) (4)
- Availability, scalability and cost-effectiveness of cluster-based internet infrastructures (2001) (4)
- Design And Implementation Of An Island-Based File System (1999) (4)
- SVC: Selector-based View Composition for Web Frameworks (2010) (3)
- Flexible, extensible Java security using digital signatures (1996) (3)
- Panel Three: Implementation—What Methods, If Any, Can Be Employed To Promote the Existing Rules' Attempts to Protect Private Identifier Information From Internet Access? (2011) (3)
- A Centralized Token-Based Algorithmfor Distributed Mutual Exclusion (1992) (3)
- Security Audit of Safeplug "Tor in a Box" (2014) (2)
- Integrating Parallel Prefetching and Caching (1996) (2)
- Efficient commerce protocols based on one-time pads (2000) (2)
- Query Affinity in Internet Applications (2001) (1)
- Viewpoint: Technological access control interferes with noninfringing scholarship (2000) (1)
- Mobile Code and Security - Guest Editors' Introduction (1998) (1)
- A safe vertex (1988) (1)
- RECOMMENDED FOR ACCEPTANCE (1990) (1)
- Avoiding hostile applets (1997) (1)
- Ideals and reality: adopting secure technologies and developing secure habits to prevent message disclosure (2009) (1)
- Design and implementation of secure trusted overlay networks (2009) (1)
- Mixcoin Anonymity for Bitcoin with accountable mixes ( abridged pre-proceedings version ) (2014) (0)
- Efficient Rollup Batch Posting Strategy on Base Layer (2022) (0)
- Detroit tries back road approach (1990) (0)
- An efficient distributed packet filtering heuristic for defense against distributed denial of service attacks (2003) (0)
- How Security Research Can Impact Policy (2015) (0)
- Help wanted on internet security. (2014) (0)
- Control of sensitive data in systems with novel functionality (2012) (0)
- Toward a healthy wireless privacy ecosystem (2012) (0)
- Dr. Felton Goes to Washington: A Personal View of the Microsoft Antitrust Case (2000) (0)
- Efficient L2 Batch Posting Strategy on L1 (2022) (0)
- MM&Sec'09: Proceedings of the 2009 ACM SIGMM - Multimedia and Security Workshop: Foreword (2009) (0)
- Virtual Memory Systems for Optimal Energy Consumption (0)
- Occupational Heterogeneity in Exposure to Generative AI (2023) (0)
- Readin gBetwee nth eLines: Lesson sfro mth eSDM IChallenge (2000) (0)
- Keynote Talk (2015) (0)
- Dynamic tree searching (1995) (0)
- Improved Method for Election Auditing (2011) (0)
- Summary of Expert Testimony (2000) (0)
- Dr. Felten Goes To Washington: Lessons from 18 Months in Government (2013) (0)
- Coping with Outside-the-Box Attacks (2008) (0)
- Blockchains : Secure and Reliable Large Scale Distributed Transactions (2019) (0)
- Support for Software-Independent Auditing — Short Paper (2009) (0)
- Mobile Network Objects (1992) (0)
- SECURITY STORAGE SYSTEM FOR CLOUD USER USING OSD WITH A SELF-DESTRUCTING DATA (2014) (0)
- Replication data for: A Method to Link Advances in Artificial Intelligence to Occupational Abilities (2019) (0)
- The trashing of Big Green (1990) (0)
- Fault tolerance in the pulsar cluster server (2004) (0)
- Ehtisaab: A Comprehensive Approach to Tracking Corruption and Inefficiency in Resource-scarce Settings (2012) (0)
- Benchmarking the Connection Machine (1987) (0)
- I Copy-protecting Cds Digital Rights Management, Spyware, and Security (0)
- Strangers in a Strange Land (2009) (0)
- When code isn't law: keynote presentation (2019) (0)
This paper list is powered by the following services:
Other Resources About Edward Felten
What Schools Are Affiliated With Edward Felten?
Edward Felten is affiliated with the following schools: